[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Qemu-devel] [PULL 4/9] crypto: avoid two coverity false positive error
From: |
Michael Tokarev |
Subject: |
[Qemu-devel] [PULL 4/9] crypto: avoid two coverity false positive error reports |
Date: |
Fri, 4 Dec 2015 09:57:35 +0300 |
From: "Daniel P. Berrange" <address@hidden>
In qcrypto_tls_creds_get_path() coverity complains that
we are checking '*creds' for NULL, despite having
dereferenced it previously. This is harmless bug due
to fact that the trace call was too early. Moving it
after the cleanup gets the desired semantics.
In qcrypto_tls_creds_check_cert_key_purpose() coverity
complains that we're passing a pointer to a previously
free'd buffer into gnutls_x509_crt_get_key_purpose_oid()
This is harmless because we're passing a size == 0, so
gnutls won't access the buffer, but rather just report
what size it needs to be. We can avoid it though by
explicitly setting the buffer to NULL after free'ing
it.
Signed-off-by: Daniel P. Berrange <address@hidden>
Reviewed-by: Eric Blake <address@hidden>
Signed-off-by: Michael Tokarev <address@hidden>
---
crypto/tlscreds.c | 4 ++--
crypto/tlscredsx509.c | 1 +
2 files changed, 3 insertions(+), 2 deletions(-)
diff --git a/crypto/tlscreds.c b/crypto/tlscreds.c
index 5ec982c..e7d9c1c 100644
--- a/crypto/tlscreds.c
+++ b/crypto/tlscreds.c
@@ -123,10 +123,10 @@ qcrypto_tls_creds_get_path(QCryptoTLSCreds *creds,
goto cleanup;
}
- trace_qcrypto_tls_creds_get_path(creds, filename,
- *cred ? *cred : "<none>");
ret = 0;
cleanup:
+ trace_qcrypto_tls_creds_get_path(creds, filename,
+ *cred ? *cred : "<none>");
return ret;
}
diff --git a/crypto/tlscredsx509.c b/crypto/tlscredsx509.c
index d080deb..26f18cb 100644
--- a/crypto/tlscredsx509.c
+++ b/crypto/tlscredsx509.c
@@ -255,6 +255,7 @@
qcrypto_tls_creds_check_cert_key_purpose(QCryptoTLSCredsX509 *creds,
}
g_free(buffer);
+ buffer = NULL;
}
if (isServer) {
--
2.1.4
- [Qemu-devel] [PULL for-2.5 0/9] Trivial patches for 2015-12-04, Michael Tokarev, 2015/12/04
- [Qemu-devel] [PULL 7/9] scsi: remove scsi_req_free prototype, Michael Tokarev, 2015/12/04
- [Qemu-devel] [PULL 9/9] bt: check struct sizes, Michael Tokarev, 2015/12/04
- [Qemu-devel] [PULL 5/9] configure: use appropriate code fragment for -fstack-protector checks, Michael Tokarev, 2015/12/04
- [Qemu-devel] [PULL 1/9] util/id: fully allocate names table, Michael Tokarev, 2015/12/04
- [Qemu-devel] [PULL 6/9] gt64xxx: fix decoding of ISD register, Michael Tokarev, 2015/12/04
- [Qemu-devel] [PULL 3/9] configure: Diagnose broken linkers directly, Michael Tokarev, 2015/12/04
- [Qemu-devel] [PULL 2/9] bt: avoid unintended sign extension, Michael Tokarev, 2015/12/04
- [Qemu-devel] [PULL 4/9] crypto: avoid two coverity false positive error reports,
Michael Tokarev <=
- [Qemu-devel] [PULL 8/9] typedefs: Put them back into alphabetical order, Michael Tokarev, 2015/12/04
- Re: [Qemu-devel] [PULL for-2.5 0/9] Trivial patches for 2015-12-04, Peter Maydell, 2015/12/04